Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-01-2025 18:09

General

  • Target

    https://github.com/dezumoe/Logitech-G-Hub/releases/download/Download/latest-x64.zip

Malware Config

Extracted

Family

vidar

Version

9.9

Botnet

98488d7eaaec81be7d2ca43b1d67bdcc

C2

https://t.me/ta904ek

https://steamcommunity.com/profiles/76561199695752269

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/dezumoe/Logitech-G-Hub/releases/download/Download/latest-x64.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd2c33cb8,0x7ffcd2c33cc8,0x7ffcd2c33cd8
      2⤵
        PID:4216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
        2⤵
          PID:8
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3412
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
          2⤵
            PID:804
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:1
            2⤵
              PID:1244
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              2⤵
                PID:2232
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4596
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                2⤵
                  PID:4404
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1772
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3260
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:1
                  2⤵
                    PID:5032
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:1
                    2⤵
                      PID:3864
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                      2⤵
                        PID:1472
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                        2⤵
                          PID:1520
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,5587606293062537646,7881755011954866775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5836 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2192
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2492
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4236
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:540
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_latest-x64.zip\Setup.exe
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_latest-x64.zip\Setup.exe"
                              1⤵
                              • System Location Discovery: System Language Discovery
                              PID:4356
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /k copy Room Room.cmd & Room.cmd & exit
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1848
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4952
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /I "wrsa.exe opssvc.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1572
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1508
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2580
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c md 304707
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1308
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "proceedsscholarsbeingsattempted" Priorities
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3772
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c copy /b Impact + Spray + Highs + Ceiling 304707\z
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1564
                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif
                                  304707\Shine.pif 304707\z
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:1124
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif" & rd /s /q "C:\ProgramData\AFHDHCAAKECF" & exit
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2856
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 10
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Delays execution with timeout.exe
                                      PID:4684
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping -n 15 127.0.0.1
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:3440

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\57fd54c4-48bb-43e5-8d5a-7fa2b774d50e.tmp

                              Filesize

                              10KB

                              MD5

                              a9d11679954d49cbcd1d33a6b99c2d26

                              SHA1

                              d03d993d0a14f2d55234347317746f176c0c8d27

                              SHA256

                              e70d318128da8b99f418af85cb380ff588633e38515eaf0c51b7aea0f91ffe98

                              SHA512

                              a0ab8e3998e3b23d09b1d827026666d186b3852035d7574750273431dc00335f164283c7dc6dc5306fc558d5e51ea4c4f5938490149c48d9e38ac41a8f1c4fd0

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              003b92b33b2eb97e6c1a0929121829b8

                              SHA1

                              6f18e96c7a2e07fb5a80acb3c9916748fd48827a

                              SHA256

                              8001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54

                              SHA512

                              18005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              051a939f60dced99602add88b5b71f58

                              SHA1

                              a71acd61be911ff6ff7e5a9e5965597c8c7c0765

                              SHA256

                              2cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10

                              SHA512

                              a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              265B

                              MD5

                              f5cd008cf465804d0e6f39a8d81f9a2d

                              SHA1

                              6b2907356472ed4a719e5675cc08969f30adc855

                              SHA256

                              fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                              SHA512

                              dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              365a57c789449fcecf44993c7b03e098

                              SHA1

                              fbdca405ad5ea341f05b71c13307243b2b25072b

                              SHA256

                              9c1e4714adfeacb8e86ba9333455247060500297dfd0d73f9931b312d2b0225f

                              SHA512

                              92fdbabdb1969526d3a1a93a25d80c4bd704a17fcee29849b2fe4fc67329c7af47a2420110c3a8fe11cfb8987447183dabcbdcbea38ae7c873579361f71778e4

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              b7267795a264f1ac3c7d0469f7c1a894

                              SHA1

                              082ce964a755b925d12ff7a7c0576d2744d4f69f

                              SHA256

                              e439d0a3ec89a11e22ed37f12e84350057e18860a932303b69d4f42f2251eee9

                              SHA512

                              cc0a28b98a6f374df950aad70f2ef2cd944b165fe5f4a4e8e45ef0ea3f69401dd8f768aa8691f3c0411561eba3623990667e36024d85a0c5b16e35f1d3cff2a8

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              46a01bde0d877c764001d598395719bb

                              SHA1

                              a6ea861d5968a40b3131310ae882a0e794f0c50f

                              SHA256

                              690edf113f5eea47ddd6609b9a53898c5025c2f62241ef5d512e33f9ccaf508f

                              SHA512

                              8702b3d9366ed8fc1be3f31b0ddac888dfa3a3dac8a68b8cac9d59c2dce8ba2e8d19583ff5983d61180880e757f5ae8332c86a6d94e3d37cfa063125e9034da3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif

                              Filesize

                              915KB

                              MD5

                              b06e67f9767e5023892d9698703ad098

                              SHA1

                              acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                              SHA256

                              8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                              SHA512

                              7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\z

                              Filesize

                              372KB

                              MD5

                              e7b272e4804e27bf9ff64f6fb88cd7e0

                              SHA1

                              7250958cd53b5f6f4de5676c16e33311a3d4b857

                              SHA256

                              6363324addcacdb08d9134b6005a9e99e4793dd927b8c4f3d67d250853440e5d

                              SHA512

                              b67440501b4e346e89ea3e41e9aa1bf06396fb75c114b34f95269f3392bf7befe9802bf08ca7c3b2fba066216f041bcff3a60821419eac278469501a27fcf56b

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Albert

                              Filesize

                              20KB

                              MD5

                              079dfc5410b0a15d8a2c5a3771d4d6df

                              SHA1

                              142dea287ca569b08011a77af9f8c5453b132847

                              SHA256

                              f0d335312413f293c46796acfff3649c2cbb88f40e6d6e68fe367ed0f82922cd

                              SHA512

                              1e2e28c489b739b1027b0656c5cf0457261977b973774cf8786fa4ceaec7e5a64cb708cbb21d5285573e404d9eb8ffece80b315a537dc90b831c607c747ac5a3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cambridge

                              Filesize

                              52KB

                              MD5

                              e4e4eb32d37126b0fefd144cfd0ca0cb

                              SHA1

                              de8e48aa3bb6c9662b4945b3a855c760274b9d72

                              SHA256

                              c5f686d90250df5f2e8615163a54b36056f9a6dbe8d8d73f8916f26784b1c97b

                              SHA512

                              4e51e93a9f53b83178e630344c73357f614c15921242242f113207ff7f3f96684fa7edaf301859561d92d5fb59750ece44865bc5e6b17e68aef16f9ccd0750db

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ceiling

                              Filesize

                              50KB

                              MD5

                              50d3dbd0db78d2a8cc0ed58b4a4b39a6

                              SHA1

                              90162d2833882e597901331e2414b396b472bb21

                              SHA256

                              f56fc2515cb14a957ad25b69707f3614a9e48d3255191f43f0a92c8f80673765

                              SHA512

                              9637e71f39a7192a52a9bfd1ba0db0c93ccd9176b0f683135935564e5874fa28539e4e7449600442497eb2b3b05bf911dfe0f2349001dd5cd78f29b257618030

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cnet

                              Filesize

                              29KB

                              MD5

                              bfc9d589bed3445f3a64c55ad61edb22

                              SHA1

                              28a1b7c62d5fdabf394a8774740529b8c237528a

                              SHA256

                              8abad5c8bf20f6d59ef831d5b6f068ab84b28e1e3cb99080500ed7e3d86752f3

                              SHA512

                              ff686ee8b01f0afbf7204648ec454f57507bdeafc5287317213d0459f1e45d558af6a59bdc28f8395174a6ebc14f0938d815ceb68a3d28e2c64819f0b0ac58c0

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Containers

                              Filesize

                              25KB

                              MD5

                              1d665d611f0ff7b056fa14f2964f3194

                              SHA1

                              cba5343ad045b2b6a44fff2e617aa63c232e45de

                              SHA256

                              8e79a421547ecb026103552ac6dc9981fae639ec8cf80ace0f5eb785700f3125

                              SHA512

                              d7ef6bf47946783a42d7cbdbc54b66b5279d2004c7c546b303cf68ff94323d1a3e3bcba0444418d368a0fdea170c76cc0a2d1a1487b948f59c3af1bc46d43842

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cost

                              Filesize

                              37KB

                              MD5

                              9cb04b15fca51c4f9a44fff3966fed32

                              SHA1

                              1a4be360cc4f6c84d43cd870406ef63413d4d4c8

                              SHA256

                              b5ef3500532c83714548ca76cc3e596b56526fb8ec066ccbd09099a727e21659

                              SHA512

                              eae1680a0c22f3e765d123d0f22cbdf64f76b266ad840e83d652c4206e5dce1e838d99d2e265d78a9e59912211ade244b249bf1897576ac014db1137419a9161

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cowboy

                              Filesize

                              40KB

                              MD5

                              02b78981c838968085bfe0de289b5215

                              SHA1

                              2f5ffb36bda5275bc4d9d0d47a542006b8b1584d

                              SHA256

                              c6d5ac7393f735ff356d1ec357090ef4041ee21e76442b8c56b72c81235d4d0a

                              SHA512

                              cdba8181407204f0a68d11ae62d0d5d08d35fb9bb8b74245c9bf84f83a5ddfd69a4fe71b1decd34349013adc5e24094e676ef0599fef0fb7363cb641d13866e3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Earth

                              Filesize

                              30KB

                              MD5

                              4f3987c88027f24ae2e056b60ce0608c

                              SHA1

                              59287c9c72601e3af55d0fd9ff12688991d21c88

                              SHA256

                              826d54a4bfdaa6bf94f9aa539cef7500615aa3302269542d626bfcffaacd40e8

                              SHA512

                              9f357821e7474a72868dcf1b1e1d50219d5b1b6c2faa77c2a31e2ad244af133427a0b72720625cc936872fb4da72c191ecf1e075e169190092da8183b86783d0

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Echo

                              Filesize

                              38KB

                              MD5

                              81b866521f089d0754736909afe3acc1

                              SHA1

                              c5e2ac3d3c782399ea975825676c6c28d0cda4da

                              SHA256

                              d4f16caed11e8b0483e2fdff4f5a8ce4616c04329e1229f81b55c6fe3172ff92

                              SHA512

                              589e80f013a198b51444c3b7086988eaf4d347599ed82be449a18b765ec4b5045f6ce29bcaa658460746519b196ed278df51a2fd5350c3c39e169eb52fd3a392

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Exceed

                              Filesize

                              17KB

                              MD5

                              8cd48b44bc6ef77ee3daa3f815292e4a

                              SHA1

                              781cf7e513f2b21f01bf63c64175c674dd0b6509

                              SHA256

                              a8b4c0b980f6ad61c96dec7980518abf53d52b7fc412369776d561b36efeff51

                              SHA512

                              fb3ce9190657af1cc35376075830d011b8c7ad3a5b1a63bd0fb14a762bc3e29a224f34d4daac66ba05ca3aaa1e5ebd42617622ea1c88b6da7dbd93b391936878

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Exhibitions

                              Filesize

                              48KB

                              MD5

                              4845d3976da1b0dbfc8a7076b9b576fb

                              SHA1

                              26d8e94eecea60151426c0d2b2a2e32e6ef25225

                              SHA256

                              e43dd9cb0d3f2818af01e68f63634ee59755a9cfd4138193906216d88f10143d

                              SHA512

                              42b5e807785d66b95b850fcb4dc1aebf5884a402585334bb0636e3b143eced7d05a0c69cacf42cf57b72d2c27430e168c57e3699a6746ef28f66c845d637163d

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Gnu

                              Filesize

                              35KB

                              MD5

                              66749747269216de87084c7d52740112

                              SHA1

                              e92d51034059d49b087d5cbe2b0eabc7cb870017

                              SHA256

                              07e9af45d4dfdca450c1b4f022b32d05e5245f6bbe93bfdadfdd80ecc5c57c06

                              SHA512

                              e113c5380850c68f3e9ca74fe5a85a699eef85af08bd25adf780b7b9730983aafe9e0f9ad8e81815057db25e7b2942e9bd2a77fe2d1c3929a9cad29d6533e50c

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Highs

                              Filesize

                              77KB

                              MD5

                              febbb47302f3651238136ba7231a9233

                              SHA1

                              a31f40aee6b7b34af5a32b1915cfe9c99b59b45f

                              SHA256

                              6e73ca78a3d5a9d458291b89f4ec69aef6f04483836092dae213cf6f951f8db6

                              SHA512

                              dbc0d4274e300b822f5107a5fc1135ee6accf718db8c28abdc7ec21ed9cbd6d51a4c7d1ebe66fe8781cb52bae7153601184f9eeec9826c7e4b01d1640750f7ae

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hostels

                              Filesize

                              28KB

                              MD5

                              25794e1064554f83bb0c44b080622779

                              SHA1

                              c2168173df54449838625a9e2f3ea4234ea97287

                              SHA256

                              e512764af89828234d01597420478c9fb2e1d213f1f367aeda70933e15a8c375

                              SHA512

                              d7fc84cb0a1df3ec8c514bb65e1157dad7cabce6e96649213a4456dc64f9931d642bd8f9bb83e371229d0845ab3545e505ceea83a573abf9864b4d6217e3d362

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Impact

                              Filesize

                              146KB

                              MD5

                              7fdd9548391e401bfbcb86c17e4c8c3b

                              SHA1

                              75091cd1eab616547c3703554a23df1ca98d1fc5

                              SHA256

                              7972ee49faae16910e0b7b318c8fb81c62f99138b6786bf2f169230db8b93912

                              SHA512

                              e344a19355cf0f9abf47a10d52cf81b8d0990189a772353b2602659f7590acb454e58a4b617f5040a4484843924c37a5f453e8be302074b6987e185f70562a93

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Jungle

                              Filesize

                              15KB

                              MD5

                              a7eb66e52905dc186f036abc180a5046

                              SHA1

                              c1d15b635d6e750bd512de807c93847f2e0bfb13

                              SHA256

                              cf3f326aac1f32c2d53fc00958073398e3fa04ee9d1bb6a361013bc45e1e6f8b

                              SHA512

                              d0e55b6b144c02288b788661d6a4a4baa79a3e07cc529e66dee2d2c8d0b85831e33398c956b7749bceda225410ae097b0f81eff71e75c61aa2a38cfac394f633

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Kingdom

                              Filesize

                              13KB

                              MD5

                              3b3d4e1d4e0f8451c3902501ffe5d57a

                              SHA1

                              b21e4221fac05c9418202840fe2ac8ee2318cbec

                              SHA256

                              d9ebb830674e85027183ce2df03c62888030f4dae82c7471aadb832f22b5414f

                              SHA512

                              b79dae8b25a59a7f2ad628e17ec239c21db4c58fbfb655c2e92230f7699c41c7bbcf4135701b4e338fe15452c853b4d7f056fc5bb9be311768e668930843d3ec

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Min

                              Filesize

                              63KB

                              MD5

                              a770be5fc6716b098d24fb856b0aa629

                              SHA1

                              18a00d8143b2feabb267bb669cb66b8ac88a6aa2

                              SHA256

                              9e5923fe6745fc55747b94cdcd2dddb10dd8733a2dce1b85e428644793bf0380

                              SHA512

                              2eefdc9da45c12f8e81250e30467617265ea8e9f403867116c4a4bece820e074cc934cc110610f7d9754595b4a0a9ce0521107d521bb69390d0bc67c48eb6d30

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moon

                              Filesize

                              15KB

                              MD5

                              a63d11c94944115efe9dcb8485a6d51d

                              SHA1

                              ad59f7e7ae4d84cb4bc9491d9cac1129598dcc64

                              SHA256

                              3541881a222a40c41a11c8215b52959fa661214f5a4a9c70bd49f834adafab71

                              SHA512

                              e9478f57acf62565c68467bc810589c13c8e8fe326726abfdd4157781390df3b3fb40145168580ecd6e12bf9e83bffa35b99cbc67a8eaf6b6ff873bdabb8c7a6

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nick

                              Filesize

                              65KB

                              MD5

                              4e5672c282edd0e6a9a5f1cf57d332dd

                              SHA1

                              1986d3cb3f050f1aba5f4b51e1536d1aa99b4192

                              SHA256

                              b474c63f62a8e729e3527d64b84d37d560c865e03afd22d5f1c97cc9555a3060

                              SHA512

                              fbb1cd269795e83f465da1eb230eea999afec92233254cdbd1fce31cbea5f9596eb2d8664188d9447a6fb3ecf660ccd23fcf87d3a0bfe337650788f0892c71cc

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Normally

                              Filesize

                              66KB

                              MD5

                              596f6c72e34424040276d1ab55e0f7cf

                              SHA1

                              573d27da380ed02b269534d6638d554df57d7c3a

                              SHA256

                              a3b8e07b3be465a4258e890ecd71fb9d421768ba18c2346ff32eda3488a58df9

                              SHA512

                              65c411fb31f5ef60bc7ef02ab385d0076c1f1c98f4c29f1164a9394e2c309bab2b0dba321c89c63b27964c8984323deaa00d6e16af79781ca999119a11ec0376

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nov

                              Filesize

                              47KB

                              MD5

                              88449540f6854b9763995e9010ead5f8

                              SHA1

                              062a6f1abbbaba46f4566c07fe36b0f1b4381fca

                              SHA256

                              eaa25673d8e4b9256f4ca127da71ae4c9180cd1e9f4d44d45a0d58c846f97bb3

                              SHA512

                              f789be1c5ecce00774a0f75aee3d1359a23a602f3b6930db1d3b3a377cd6eb8b62d0e4e6b44d2a893c4ea462741c7708c74cfcd95266ddf608edaa7534e2c355

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Priorities

                              Filesize

                              92B

                              MD5

                              d87d9a6328a3d42c17c4133d956f517f

                              SHA1

                              b939d56760afb2315d0878f47741f96a6391dd81

                              SHA256

                              34c75ff522b8a9db076aae0e42e95ad0beb77bd6ffbfc16b6774b0d45b0b911d

                              SHA512

                              400876bd435f12dcc3f3b0ac604a0ee65bdda56ae6842a5e3070ba7b3d4928c15cf7bd933b4e1bb324f9e913886c3eeafa1e4e7e5482c208b38c5aa5788ed1ae

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ray

                              Filesize

                              19KB

                              MD5

                              96af1b45854e9ab33fd769a79aa7cefd

                              SHA1

                              b63a6ba7840f7f62f23b0d4bbfbb90af40339282

                              SHA256

                              3a11c16b348481f39066ab3e0ec033dd477f29785eed2da0ada0bd2f3a9d03bb

                              SHA512

                              98aabc3143b4ea143e2a329daea97c1fe06386d72d2df8dc3a4e39588c4acc7cd6c86e4f1f0ac3be8c4cc0f5f3a5b5232f9526730648b52373ae0e0787d65cb7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Room

                              Filesize

                              23KB

                              MD5

                              b1f21c390c54c5c2a98fb55a35c63253

                              SHA1

                              fe8db69bf03544b698459337a355edea89ee83fa

                              SHA256

                              6d407c39e84b8f4edb6946fb7993d4055b781d8952200cb8e8c117f92c32e1d3

                              SHA512

                              a024afe79ab0a27f4627ccf099a4c5bcffe29d5536220a8743e7efd7001a3cbb8b7cc5c66c73a35cafc1bc360fa8aca12a0afa481a33469d2d1f036542c3bd70

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Rough

                              Filesize

                              34KB

                              MD5

                              c27db32d4242f01357e2db8a3dd1bb59

                              SHA1

                              03f04166ef84f72f6fa5472ae479acbfcbc101c3

                              SHA256

                              3b4ae6f80f9eba9189aaa2c7d79f5dd10a41ae91020db899b23131ea36d7a649

                              SHA512

                              3dd825e1125c5daf8aa0bd26cf15f264d7d94d7b18c4ec2a80c661526a36930b86a1d72538f5702d2f66e7ee060f63f0ea82ac8c9662d7f6cdfcb7986c185b3b

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Screens

                              Filesize

                              42KB

                              MD5

                              c4b113a02186c7e7a70130b20ae383b7

                              SHA1

                              531635fe7ac78db49170d7aea5510ddb92542637

                              SHA256

                              eda59b06cea3af8fc01c8b51d364d89fe79e998336a4873555cee76fb4bd8d4b

                              SHA512

                              f5c171a39f1eff059eba6ab649912436de7b3eb399f022b2e13d0eab8454639a1b4216c54d20f3574473f8c8e1f640620a9a40c4f844ce19fc5a34c5510d51f7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Skill

                              Filesize

                              33KB

                              MD5

                              08f23532b187a07575dd8488ff23ec96

                              SHA1

                              074a26961791eb321f3e90e07fdd72b5316ec321

                              SHA256

                              31e35c0d393f73d20ecc3680528d17d9837d4913d391cd7cc85770e815a38735

                              SHA512

                              387111dcf8fb75203d9fe942a55a977b96f837c0c9e802706eea13a1ed60b4efeddb9156a0d7bf4f8cd9c7b50555b950520b6c9434238d5e35ed804dea70508b

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Spray

                              Filesize

                              99KB

                              MD5

                              1fc5385349c9ebc7599dca69a2f0c65c

                              SHA1

                              5f656ad103de6068741f43d721d9cec52bcb9c43

                              SHA256

                              868510635eeef94d64f712499091e79e09bcba0ee222894057b0e8941684b0aa

                              SHA512

                              20c0a843c7cc82180d032b200152c7c10553c4b802516e025ddd8b9d1be0736ebbaddc266be20eecf77f171c996fa8eddc257ffe3c1e30166dea35d46fb204c8

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Technology

                              Filesize

                              31KB

                              MD5

                              7a634447eb6b81519d99fc571f44009c

                              SHA1

                              44055368e8a817ea9833100e48059140cfc42fde

                              SHA256

                              626eaa6ed33fb5244d3484d53a06323302bf83dcefe9a6d09b1d94944acebdd8

                              SHA512

                              e616e39754bc6de364ba97e41cc1807f8ababdedda154b77a421ce117b695109981284f4839b00dde2ae3e6df1205b5f22f9822292f2e4db7c6d41e39554cb8d

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Transactions

                              Filesize

                              22KB

                              MD5

                              a0d02e32ff4e9bfadf9a34ac1fc400b7

                              SHA1

                              ad101d77e9af1cd845ab7f7086d18c863ba005d3

                              SHA256

                              d961f3d6995e518d02190164efaeeca050ecd2badbd278481fc4ac8d0121bfab

                              SHA512

                              0ef72d33e3a4f95acde7e941cf67b2116e6e82f7c061f5ef30fd0ec9cf9769507df508833b91223347723e380e69bcc01f56e59554e8f687c79c10e5a95b8df0

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Wallpapers

                              Filesize

                              51KB

                              MD5

                              1ee31954db32328f6e5d3eb676c1fcaa

                              SHA1

                              b5b84b64993aea5c06fcd53d9e8600db57c19df6

                              SHA256

                              229b4250fdbbfc9ee38717100e68d7e8b67ec20e309bf8e5c1d94e8c2c27d27e

                              SHA512

                              56474e7a5c84f41bdf29e01f8072ef7780a1a3817680a58e1711d617b17df178097f0650af41247140a8f1691da99b9dc944e1338af0a8c4baaed78cc3f5e693

                            • C:\Users\Admin\Downloads\latest-x64.zip

                              Filesize

                              930KB

                              MD5

                              5c6dd1119b69bc5b636dfbf0fb5b8dbc

                              SHA1

                              3210b9dcc0475cd1e364a0615adaac6f6a35346d

                              SHA256

                              68474c19bdd63d5d4e4a7de4cd245cdb157a09bb20d1e0494a45db2e6bd18fa3

                              SHA512

                              dcfd85eb7cc304484dad2fee72feb7332a35b80f4b172a3251b3c74bfe64973280a44294b38daf990f20efcfa7e0c39c9e0fce341f6466b15ba6db03e1087a58

                            • C:\Users\Admin\Downloads\latest-x64.zip:Zone.Identifier

                              Filesize

                              26B

                              MD5

                              fbccf14d504b7b2dbcb5a5bda75bd93b

                              SHA1

                              d59fc84cdd5217c6cf74785703655f78da6b582b

                              SHA256

                              eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                              SHA512

                              aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                            • memory/1124-660-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-659-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-661-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-662-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-663-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-692-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1124-693-0x0000000000070000-0x00000000002B9000-memory.dmp

                              Filesize

                              2.3MB